1. Introduction
  2. How we collect and use your personal information
  3. How we use cookies, similar technologies and SDK technology
  4. How we share, transfer and publicly disclose your personal information
  5. How we protect your personal information
  6. How to manage your personal information/your rights
  7. How we process personal information of minors
  8. Location and period of storage of information, and how your personal information is transferred globally
  9. How to update this privacy policy
  10. How to Contact Us/User Complaint Channels and Feedback Mechanism
  11. Advertising/information we send to you
  12. Scope of application MR CARVE (hereinafter collectively referred to as "this application") is well aware of the importance of personal information to you, and will do its best to protect the safety and reliability of your personal information. We are committed to maintaining your trust in us and abide by the following principles, Protect your personal information: the principle of consistency of rights and responsibilities, the principle of clear purpose, the principle of choice and consent, the principle of least sufficiency, the principle of ensuring security, the principle of subject participation, the principle of openness and transparency, etc. At the same time, we promise that we will take corresponding security protection measures to protect your personal information based on mature security solutions in the industry.

Please read and understand this Privacy Policy carefully before using our products and services.

  1. Introduction

" MR CARVE " is a service product provided by Dongguan Chuangkong Space Technology Co. , Ltd. (hereinafter referred to as "we"). We attach great importance to the privacy of users and the protection of personal information. We will take corresponding security protection measures in accordance with the relevant requirements of national laws and regulations such as the Cybersecurity Law and try our best to protect the security and controllability of your personal information. When you use this product, we may collect and use your relevant information. This privacy policy will explain to you how we collect, use, store, share and transfer this information when you use this product, and how we provide you with access, update, delete and protect this information:

  1. Clear and definite

We will try our best to explain the privacy policy to you in plain language so that you can have a clearer understanding of how we protect and process the information we collect.

  1. Protect rights and interests

We will take adequate and reasonable measures to protect your privacy rights.

  1. Respect users

We respect the free exercise of users' rights to choose and know, and allow you to manage your personal information.

  1. Necessary safety

We only collect necessary information and use this information to provide you with safe and detailed services.

  1. Timely and considerate

We will always listen to your inquiries and answer your questions as soon as possible.

We hope that you will read the "Privacy Policy" (hereinafter referred to as "this Policy") carefully and learn more about how we collect and use information, so that you can better understand our services and be more consistent when choosing whether and what services to choose. Your true meaning.

Please read this policy carefully before registering or using our services. If you use the services we provide, it means that you agree with what we have stated in this policy.

If you have questions, please contact us.

For better explanation, the following concepts in this policy refer to:

Commonly used personal device information: includes hardware serial number, MAC address, software list, Android ID, IMEI, IDFA, UDID, GUID, OAID , MEID, IP address, SIM card IMSI information, gyroscope, gravity, accelerometer, sensor, WIFI Information describing the basic situation of personal commonly used devices, including BSSID/SSID, acceleration sensor, installed App information and running process information.

Personal GPS location information: includes whereabouts, precise positioning information, rough positioning information, longitude and latitude, etc.

Commonly used mobile phone permissions: camera, photo album, storage permission, external storage permission, microphone, clipboard. The camera album is used to upload user avatars or pictures, and is stored as cached data for better browsing speed.

Self-start permission: The integrated push self-start service is used to improve the accessibility of message push. It can receive application notifications and messages in a timely manner and improve the accessibility of push notifications.

  1. How we collect and use your personal information

Personal information refers to various information recorded electronically or in other ways that can identify a specific natural person alone or combined with other information or reflect the activities of a specific natural person. We will collect and use your information for the following purposes described in this policy. personal information:

Business functions that collect personal information and personal information collected

How we use the information we collect

We will use your information for the purposes stated above. When we want to use information for other purposes not specified in this policy, we will obtain your consent in advance. When we want to use the information collected for a specific purpose for other purposes, we will obtain your consent in advance.

Information you share

You can share your relevant information with other users through our services. For example, text and photos you share publicly in your circle of friends.

Please note that this may contain sensitive information such as your personally identifiable information and personal property information. Please carefully consider disclosing your relevant personal sensitive information.

You can delete information you have shared publicly through the settings in the Service or through the instructions we provide. However, please note that this information may still be stored independently by other users or non-affiliated third parties not controlled by us.

  1. How we use cookies, similar technologies and SDK technology

Cookies

In order to ensure the normal operation of the website and provide you with an easier access experience, we may store small data files called cookies on your computer or mobile device. Cookies usually contain identifiers, site names, and some numbers and characters. You can perform corresponding data clearing operations in your browser.

Other technologies

In addition to Cookies, we also use other similar technologies on our website.

SDK technology

SDK technology is provided by third-party organizations we cooperate with, and we can only know the permissions they require to obtain authorization. The third party will need to collect your information, and we will not be able to obtain your information unless the third party explicitly discloses to us the sensitive information to be collected. For the permissions required by third-party organizations and the collected sensitive information explicitly disclosed to us, please see the "SDK Technical Description Document" for details.

The third party's refusal to provide information will only prevent you from using the functions provided by the technology provided by the third party, but it will not affect other functions you use.

Third-party SDK list:

name

Package names

URL

SDK purpose

Tencent browsing service

com.tencent.smtt

https://x5.tencent.com/

Personal information types that x5 kernel rendering webview may obtain: IMEI, openid, Android ID, BSSID for reading WIFI, etc.

WeChat

com.tencent.mm.opensdk

https://open.tencent.com/

pay

Push

com.xiaomi.mipush

com.huawei.hms

com.huawei.agconnect

com.heytap.mcs

com.getui

 

Push function

Mobile Security Alliance OAID

com.bun.miitmdid

com.zui.opendeviceidlibrary

com.netease.nis

com.samsung.android

com.huawei.hms

com.bun

http://www.msa-alliance.cn/

Read mobile phone OAID

Pay with Ali-Pay

com.alipay.apmobilesecuritysd

https://www.alipay.com/

Pay with Ali-Pay

Baidu map

com.baidu.lbsapi

https://map.baidu.com/

Map display

statistics

com.baidu.mobstat

https://tongji.baidu.com/

statistics

Tencent

com.tencent.tauth

https://open.tencent.com/

Login, share

Gaode map

com.amap.api

https://www.amap.com/

Map display

Ali

com.alipay

https://www.alipay.com/

Alipay; mPaaS; Alibaba ride code; Alibaba Zhima Credit real-name authentication; Zhima certification

telecommunications

cn.com.chinatelecom

 

Mobile phone number verification

pangolin

com.bytedance.sdk

https://www.csjplatform.com/

Device identifier (such as IMel, IMSI, ICCID, GAID (GMS service only), MEID, device serial number build _serial, specific fields vary due to different software and hardware versions)

Youlianghui

com.qq.e

https://e.qq.com/dev/index.html

Device identifier (such as IMel, IMSI, ICCID, GAID (GMS service only), MEID, device serial number build _serial, specific fields vary due to different software and hardware versions)

Aurora Push

cn.jpush

https://www.jiguang.cn/push

Aurora push, quickly integrate push, easily increase user stickiness and fuel your mobile application.

Aurora Statistics

cn.jiguang

https://www.jiguang.cn/analytics

Trend charts understand daily data changes and easily locate data concave points. Ranking charts provide multi-dimensional comparison rankings.

oppo push

com.heytap

https://open.oppomobile.com/new/introduction?page_name=oppopush

oppo PUSH is a message push service provided by OPPO to developers. It establishes a stable and reliable long connection channel between the server and the OS.

Personal push message push

com.getui

http://docs.getui.com/download.html

GeTui is a commercial-grade mobile application message push cloud service solution. The client SDK supports Android and iOS platforms.

  1. How we share, transfer and publicly disclose your personal information

shared

We will not share your personal information with companies, organizations and individuals other than the personal information provider, except in the following circumstances:

  1. Sharing with explicit consent: After obtaining your explicit consent, we will share your personal information with other parties;
  2. Sharing under legal circumstances: We may share your personal information externally in accordance with laws and regulations, litigation and dispute resolution needs, or as required by administrative and judicial authorities in accordance with the law;
  3. Sharing with affiliated companies: In order to facilitate us to jointly provide you with services based on associated accounts and protect the personal and property safety of affiliated companies of this application or other users or the public from infringement, your personal information may be shared with our affiliated companies. . We will only share necessary personal information (for example, in order to facilitate you to use our affiliated company products or services through this application account, we will share your necessary account information with affiliated companies), if we share your personal sensitive information or affiliated companies change Your authorization and consent will be sought again for the purpose of use and processing of personal information;
  4. Sharing with authorized partners: Only to achieve the purposes stated in this privacy policy, some of our services will be provided jointly by us and authorized partners. We may share some of your personal information with partners to provide better customer service and user experience. For example, arranging for partners to provide services. We will only share your personal information for legal, legitimate, necessary, specific, and clear purposes, and we will only share personal information necessary to provide services. Our partners have no right to use the shared personal information for other purposes unrelated to products or services.

We send information to vendors, service providers and other partners who support our business, including providing technical infrastructure services, analyzing how our services are used, measuring the effectiveness of advertising and services, providing customer service, and payment facilitation. or conduct academic research and investigations.

We will sign strict data protection agreements with companies, organizations and individuals with whom we share personal information, requiring them to process personal information in accordance with our instructions, this Privacy Policy and any other relevant confidentiality and security measures.

transfer

We will not transfer your personal information to any company, organization or individual, except in the following circumstances:

  1. Transfer with explicit consent: After obtaining your explicit consent, we will transfer your personal information to other parties;
  2. When it comes to mergers, acquisitions or bankruptcy liquidations, or other situations involving mergers, acquisitions or bankruptcy liquidations, if personal information is transferred, we will require new companies and organizations that hold your personal information to continue to be bound by this policy. Otherwise, we will require the company, organization and individual to re-obtain your authorization and consent.

public disclosure

We will only publicly disclose your personal information under the following circumstances:

  1. We may publicly disclose your personal information with your explicit consent or based on your active choice;
  2. If we determine that you have violated laws and regulations or seriously violated relevant agreement rules, or to protect the personal and property safety of users of this application and its affiliated companies or the public from infringement, we may obtain information in accordance with laws, regulations or relevant agreement rules. Disclosure of personal information about you with your consent, including relevant violations and actions taken against you.

Exceptions to obtaining prior authorization and consent when sharing, transferring, or publicly disclosing personal information

In the following circumstances, sharing, transferring, and publicly disclosing your personal information does not require your prior authorization and consent:

  1. Relevant to national security and national defense security;
  2. Relevant to public safety, public health, and major public interests;
  3. Relevant to criminal investigation, prosecution, trial and judgment execution;
  4. To protect your or other individuals’ life, property and other major legitimate rights and interests but it is difficult to obtain your consent;
  5. Personal information that you disclose to the public on your own;
  6. Collect personal information from legally publicly disclosed information, such as legal news reports, government information disclosure and other channels.

According to legal provisions, sharing and transferring de-identified personal information, and ensuring that the data recipient cannot recover and re-identify the subject of the personal information, does not constitute the external sharing, transfer and public disclosure of personal information. The use of such data Storage and processing will be without further notification to you and without your consent.

  1. How we protect your personal information

In order to protect the security of your information, we will strictly abide by the technical measures and operational procedures required by laws, regulations and other normative documents to protect the confidentiality of your information, and at the same time:

  1. We have adopted reasonable and feasible security protection measures that are in line with common industry solutions to protect the security of the personal information you provide and prevent personal information from unauthorized access, public disclosure, use, modification, damage or loss. We will use encryption technology to improve the security of personal information; we will use trusted protection mechanisms to prevent personal information from being maliciously attacked; we will establish strict internal control systems, establish complete and adequate management processes, and we will deploy access control mechanisms , try our best to ensure that only authorized personnel can access personal information; and we will hold security and privacy protection training courses to enhance employees' awareness of the importance of protecting personal information.
  2. We have an industry-leading data security management system that is centered on data and revolves around the data life cycle, improving the security of the entire system from multiple dimensions such as organizational construction, system design, personnel management, and product technology.
  3. We will take reasonable and feasible measures to try our best to avoid collecting irrelevant personal information. We will only retain your personal information for the period necessary to achieve the purposes stated in this policy, unless an extension of the retention period is required or permitted by law.

If you find that your personal information, especially your account or password, has been leaked, please contact customer service immediately so that we can take appropriate measures according to your application.

Please note that the information you voluntarily share or even share publicly when using our services may involve your or others' personal information or even personal sensitive information. For example, if you choose to upload personal information when posting updates or in public places such as group chats and circles. picture of. Please consider more carefully whether to share or even share relevant information publicly when using our services.

Please use a complex password to help us ensure the security of your account. We will do our best to keep any information you send us secure.

We will update and disclose the contents of security risk, personal information security impact assessment and other reports in accordance with the requirements of laws and regulations.

The Internet environment is not 100% secure, and we will do our best to ensure or guarantee the security of any information you send to us. If our physical, technical or management protection facilities are damaged, resulting in unauthorized access, public disclosure, tampering or destruction of information, resulting in damage to your legitimate rights and interests, we will bear corresponding legal liability.

After an unfortunate personal information security incident occurs, we will promptly inform you in accordance with the requirements of laws and regulations: the basic situation and possible impact of the security incident, the disposal measures we have taken or will take, and how you can prevent and reduce risks on your own. Suggestions, remedies for you, etc. We will promptly notify you of event-related information via push notifications and send announcements in a reasonable and effective manner.

At the same time, we will also proactively report the handling of personal information security incidents in accordance with the requirements of regulatory authorities.

  1. How to manage your personal information/your rights

Personal information inquiry

You have the right to access your personal information, except for exceptions provided by laws and regulations. You can access your personal information yourself by:

Account information - If you wish to access or edit personal information in your account, set privacy and permissions, set message reminders and chats, change your bound mobile phone number and password, close your account, etc., you can log in to your account Do this through "More" - "Settings".

Personal information - If you wish to access or edit your nickname, avatar, hometown, date of birth, occupation, school, hobbies and other information in your personal information, you can log in to your account and click on your personal ID name and "Click to view" /edit" to perform such operations.

User account logout

You can submit an account cancellation application by yourself on the "Account Cancellation" page (for example, APP "Settings-Account and Security-Cancel Account").

After you voluntarily cancel your account, we will stop providing you with products or services, and delete or anonymize your personal information in accordance with the requirements of corresponding laws.

  1. How we process personal information of minors

The personal information of minors is our key protection content, please refer to Articles 5 and 6.

  1. Location and period of storage of information, and how your personal information is transferred globally

Region where personal information is stored

We strictly follow the provisions of laws and regulations and store user personal information collected and generated within China within the territory of China.

Export of personal information abroad

The personal information we collect and generate during our operations in the People's Republic of China is stored in China. If personal information is exported abroad in the future, we will strictly abide by the relevant provisions of the laws and regulations of the People's Republic of China, assess the information security of the exported information, and obtain your explicit authorization. However, if you use the Internet to publish news cross-border, etc. Exceptions are made for personal initiative.

In response to the above situations, we will ensure that your personal information is adequately protected in accordance with this Privacy Policy.

How long the information is stored

Generally speaking, we only retain your personal information for the minimum period necessary to achieve the purpose. Personal information beyond the corresponding period will be deleted or anonymized for processing. However, under the following circumstances, we may change the storage time of personal information in order to comply with legal requirements:

  1. To comply with the relevant provisions of applicable laws, regulations or policies and other normative documents;
  2. To comply with decisions of administrative agencies or similar authorized organizations, judgments and rulings of judicial agencies, awards of arbitration agencies or other legal procedures;
  3. We have reason to believe that we need to comply with laws, regulations and other relevant provisions;
  4. Reasonably necessary purposes to implement relevant service agreements or this policy, safeguard social and public interests, and protect the personal and property safety or other legitimate rights and interests of our customers, us or our affiliates, other users or employees and other third parties.

When operations cease, we will notify you through push notifications, website or in-program announcements, etc., and delete or anonymize your personal information within a reasonable period.

  1. How to update this privacy policy

Our privacy policy may change. If there are changes in business functions, changes in purpose of use, changes in the contact information of the person in charge of personal information protection, etc., we will revise the privacy policy accordingly.

We will not limit your rights under this Privacy Policy without your explicit consent. For significant changes, we will provide prominent notice. You can also check this privacy policy regularly to get the latest terms.

Major changes referred to in this policy include but are not limited to:

  1. Our service model has undergone major changes. Such as the purpose of processing personal information, the type of personal information processed, the use of personal information, etc.;
  2. The main objects to whom personal information is shared, transferred or publicly disclosed change;
  3. Significant changes in your rights to participate in the processing of personal information and the way in which you exercise them;
  4. When our responsible department, contact information and complaint channels for handling personal information security change;
  5. When the personal information security impact assessment report indicates that there is a high risk.

If you choose to continue to use our services after receiving notice, you agree to be bound by the revised policy.

We will also archive the old version of this policy for your review. You can apply to us for review through the aforementioned contact information.

  1. How to Contact Us/User Complaint Channels and Feedback Mechanism

If you have questions or suggestions about this policy or related matters, we have established a dedicated department for personal information protection. You can contact us through the following complaint channels. Leave your comments in the app. We will properly accept and respond to your appeal in a timely manner, and will respond within fifteen days after verifying your user identity.

If you are not satisfied with our response, especially if you believe that our personal information processing behavior has harmed your legitimate rights and interests, you can also seek a solution by filing a lawsuit with the court with jurisdiction over the defendant's domicile.

  1. Advertising/information we send to you

We may use your relevant information to send you commercial advertisements on relevant websites, applications, and other channels.

If you do not want to accept the commercial advertisements we send you, you can cancel at any time through the corresponding product unsubscribe function.

  1. Scope of application

All services provided are subject to this Privacy Policy. However, please note that this privacy policy does not apply to services provided by other companies or individuals, and the privacy policies of other companies or individuals apply to such services.

Company: Dongguan Chuangspace Technology Co., Ltd.

Contact information: 13549403943

Email: 3378806791@qq.com

Effective date: 2024/01/24